Esquema de segurança para agentes móveis em sistemas abertos
暂无分享,去创建一个
[1] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[2] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[3] Carl E. Landwehr,et al. Computer security , 2001, International Journal of Information Security.
[4] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[5] Fritz Hohl,et al. Mole – Concepts of a mobile agent system , 1999, World Wide Web.
[6] Dwaine E. Clarke,et al. SPKI/SDSI HTTP Server / Certificate Chain Discovery in SPKI/SDSI , 2001 .
[7] Danny B. Lange,et al. Mobile Objects and Mobile Agents: The Future of Distributed Computing? , 1998, ECOOP.
[8] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[9] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..
[10] R. Power. CSI/FBI computer crime and security survey , 2001 .
[11] Arthur C. Graesser,et al. Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents , 1996, ATAL.
[12] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[13] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[14] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[15] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[16] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[17] Ricardo J. Rabelo. Trust Building In The Creation Of Virtual Enterprises In Mobile Agent-Based Architectures , 2003, PRO-VE.
[18] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[19] John C. Knight,et al. A security architecture for survivability mechanisms , 2001 .
[20] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[21] Ricardo Dahab,et al. Segurança de sistemas de agentes moveis , 2003 .
[22] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[23] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.
[24] Thomas Magedanz,et al. Mobile agents - enabling technology for active intelligent network implementation , 1998, IEEE Netw..
[25] Alexander Morcos,et al. A Java implementation of simple distributed security infrastructure , 1998 .
[26] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[27] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[28] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[29] Tommy Thorn,et al. Programming languages for mobile code , 1997 .
[30] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[31] Pierangela Samarati,et al. Authentication, access control, and audit , 1996, CSUR.
[32] N. Asokan,et al. Protecting the computation results of free-roaming agents , 2005, Personal Technologies.
[33] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[34] George C. Necula,et al. A Proof-Carrying Code Architecture for Java , 2000, CAV.
[35] Carla Merkle Westphall,et al. Um esquema de autorização para a segurança em sistemas distribuídos de larga escala , 2000 .
[36] Atsuko Miyaji,et al. Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.
[37] Todd Papaioannou,et al. On the structuring of distributed systems : the argument for mobility , 2000 .
[38] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[39] Anand R. Tripathi,et al. Security in mobile agent systems , 1998 .
[40] Giovanni Vigna,et al. Understanding Code Mobility , 1998, IEEE Trans. Software Eng..
[41] Antonio Corradi,et al. A secure and open mobile agent programming environment , 1999, Proceedings. Fourth International Symposium on Autonomous Decentralized Systems. - Integration of Heterogeneous Systems -.
[42] Pekka Nikander,et al. Distributed Policy Management for JDK 1.2 , 1999, NDSS.
[43] Volker Roth,et al. On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.
[44] Daniela Rus,et al. Mobile Agents: Future Directions for Mobile Agent Research , 2002, IEEE Distributed Syst. Online.
[45] Joann J. Ordille,et al. When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.
[46] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[47] Hamideh Afsarmanesh,et al. Dynamic Virtual Organizations, or Not So Dynamic? , 2002, BASYS.
[48] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[49] Antonio Corradi,et al. Mobile Agents Integrity for Electronic Commerce Applications , 1999, Inf. Syst..
[50] Anand R. Tripathi,et al. Experiences and future challenges in mobile agent programming , 2001, Microprocess. Microsystems.
[51] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[52] B. Clifford Neuman,et al. Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.
[53] Rob Kling,et al. Security and reliability , 1991 .
[54] Warwick Ford,et al. Computer communication security - principles, standard protocols and techniques , 2008 .
[55] S. Garfinkel,et al. Web security & commerce , 1997 .
[56] Trent Jaeger,et al. A Flexible Security System for Using Internet Content , 1997, IEEE Softw..
[57] David Wong,et al. Security and reliability in Concordia , 1999 .
[58] George Coulouris,et al. Distributed systems - concepts and design , 1988 .
[59] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[60] A. Santin. Teias de federações: uma abordagem baseada em cadeias de confiança para autenticação , autorização e navegação em sistemas de larga escala , 2004 .
[61] Mary Campione,et al. The Java tutorial , 1996 .
[62] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[63] Refik Molva,et al. A Distributed Access Control Model for Java , 2000, ESORICS.
[64] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[65] George C. Necula,et al. Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.
[66] Pankaj Jalote,et al. An Integrated Approach to Software Engineering , 1997, Undergraduate Texts in Computer Science.
[67] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[68] Giovanni Vigna,et al. Designing Distributed Applications with Mobile Code Paradigms , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[69] Emerson Ribeiro de Mello. Redes de confiança em sistemas de objetos CORBA , 2003 .
[70] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[71] Lars Rasmusson,et al. Simulated social control for secure Internet commerce , 1996, NSPW '96.
[72] Michelle S. Wangham,et al. A Security Scheme for Mobile Agent Platforms in Large-Scale Systems , 2003, Communications and Multimedia Security.
[73] Danny B. Lange,et al. Mobile agents with Java: The Aglet API , 1998, World Wide Web.
[74] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[75] Antonio Corradi,et al. Security issues in mobile agent technology , 1999, Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems.
[76] Luís Valente,et al. Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.
[77] Moti Yung,et al. Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.
[78] Thomas Magedanz,et al. Intelligent agents: an emerging technology for next generation telecommunications? , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.